it’s not just a ‘download and every game automatically runs’ application.
That's what binfmt is for
it’s not just a ‘download and every game automatically runs’ application.
That's what binfmt is for
A Klingon bird of prey, or a romulan bird of prey?
Crab Rangoon begs to differ, but that is an extreme example
"" > “”
An object is a poor man's closure.
A closure is a poor man's object.
These are two sides of the same coin, and both of them miss the point. You should be dealing with scale, and you should use a language that allows you to concisely describe how to compute large amounts of data easily. The best part is that once you start writing APL, you'll feel like a wizard.
From experience, dont do this unless you have a very good desoldering setup. The joysticks have 14-16 pins and you need to be able to desolder every single one perfectly to get it off the board. Getting the new one on can be similarly difficult.
I have seen some custom tips for these but haven't tried them yet.
If that hasn't dissuaded you, then calibration itself is easy. Just connect it to a computer and go to the calibration website (it's a GitHub page that does it all in JS).
this could be better if it used subdomains to an evil extent - extract the main domain intended and use that:
google.com => google.phishy.pc-helper.xyz/whatever-bullshit-key-they-need
Bonus points if it works for any subdomain.
Extra bonus points for a subdomain that includes https and www (e.g. https.www.google.com.phishy.pc-helper.xyz)
My tractor thinks she's sexy
It really turns it on....
Source: worked on something similar a long time ago
Likely hash based scanning like most virus scanners. It will have a set of signatures for various types of malware (keyloggers, local DNS servers, etc), and looks through the apk (which is just a zip file) for things it knows are bad like financial malware added to the app.
Their process for adding signatures to their database and how they label them is fully opaque and completely up to them, like any other antivirus company. So they could incorrectly label things intentionally and you'd have no way to know.
given your device is now compromised you should probably get a new one unless you trust android is able to fully remove the app. Because some financial malware will intercept 2fa sms from your bank.
You're forgetting the part where they had an option to disable this fuckery, and then proceeded to move it twice - exposing containers to everyone by default.
I had to clean up compromised services twice because of it.
Cross section!
I can imagine it's really freaking hard to get the balance between chocolate, whipped cream, and banana right. Any advice for that?